目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2023-51810 PoC — StackIdeas EasyDiscuss 安全漏洞

来源
关联漏洞
标题:StackIdeas EasyDiscuss 安全漏洞 (CVE-2023-51810)
Description:StackIdeas EasyDiscuss是StackIdeas公司的一个扩展。 StackIdeas EasyDiscuss v.5.0.5版本存在安全漏洞,该漏洞源于存在SQL注入漏洞,允许远程攻击者通过精心设计的请求来获取敏感信息。
介绍
# CVE-2023-51810

## Description

Blind SQL injection vulnerability in StackIdeas EasyDiscuss v.5.0.5 allows a remote attacker to obtain sensitive information via search parameter in the Users module.

## Product

StackIdeas EasyDiscuss v5.0.5 - [EasyDiscuss - Joomla Forum Discussion Tool - StackIdeas](https://stackideas.com/easydiscuss)

## Remediation

Upgrade to a version >= 5.0.10. Version 5.0.6-5.0.9 not tested due to lack of public available source code.

## Steps

A Blind SQL injection is present on plugin EasyDiscuss (v5.0.5) installed on Joomla:

![image](https://github.com/Pastea/CVE-2023-51810/assets/24623933/4cb53cde-ccbb-47ae-a65a-782c5e0e1cee)

The vulnerability is present on "search" functionality on "users" section, that is also configured to output
SQL error messages when in the injection point is used a payload that can break the query:

Example payload:
```
a'
```


Output:
![image](https://github.com/Pastea/CVE-2023-51810/assets/24623933/bf80fbd3-0adf-40b7-a0e3-c7b825efc279)

As proof of concept, in following example a sleep(2) has been injected, that resulted in a doubled (4 seconds) sleep executed by the server. Any sleep value is doubled by the vulnerable backend:

Example payload (before url-encoding):
```
' OR (SELECT 1337 FROM (SELECT(SLEEP(2)))prime) AND 'a'='a
```

Output:
![image](https://github.com/Pastea/CVE-2023-51810/assets/10105061/07b7c1a8-8785-4bda-a723-795c7b4f7612)



Exploit URL:
> https://xxx.xxx/component/easydiscuss/users?search=[INJECTION_POINT]&option=com_easydiscuss&view=users

## Credits

Andrea Mattiazzo, Giovanni Battista Colonna, Elisabetta Fera
文件快照

[4.0K] /data/pocs/281c0d745df7960c9d75393ccda6c22971c5fe5c └── [1.6K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →